Cybersecurity Personally Identifiable Information

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Tennessee Gives Businesses 45 Days for Data Breach Notice

Recent amendments to the State’s data breach statute give a hard deadline for a business to provide consumer notice, removes encryption safe harbor, exempts entities that are subject to the Health Insurance Portability and...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

O’ Really, Canada? Data Breach Log Rules Underway

In June 2015, Canada made significant amendments to its data privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA).  These amendments to PIPEDA will require businesses to inform the Canadian...more

Sony settles employees’ class action suit for up to $8M

The Sony data breach in 2014 was one of the most significant breaches experienced and was a first on many fronts. It was alleged to have been caused by North Korean hackers (calling themselves Guardians of Peace) seeking to...more

Feds identify security vulnerabilities in state healthcare exchange websites

A Government Accountability Office (GAO) examination of the state-run health insurance exchanges for California, Kentucky and Vermont identified inadequate security measures in place to protect consumers’ personal...more

They Can Be Heroes: The FCC Proposes Expansive and Detailed Privacy & Cybersecurity Regulations for Broadband ISP

On April 1, 2016, the FCC released a Notice of Proposed Rulemaking (“NPRM”) that would impose new regulatory burdens on broadband Internet service providers’ use of customer data. The wide-ranging NPRM also proposes rules...more

2016 Data Breach Litigation Report

Data security breaches – and data security breach litigation – dominated the headlines in 2015 and continue to do so in 2016. Continuous widely publicized breaches have led to 30,000 articles a month being published that...more

Preparing For and Responding To Data Breaches (Presentation)

While companies may be aware of the threats posed to their businesses by a data breach, they should also have a concrete plan in place so that they can respond effectively should one occur. In a recent webinar, attorneys from...more

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

State Data Security Breach Notification Laws - April 2016

The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more

Tennessee Revamps Its State Data Breach Notification Statute

Effective July 1, 2016, Tennessee amended its data breach notification statute to require notification of a data breach to affected individuals regardless of whether the personal information involved in the security incident...more

[Webinar] Got Data? Analytics to the Rescue - April 19th, 12:00pm CDT

Within an enterprise, data is a dual-edged sword – it’s both the lifeblood powering critical business operations and the kryptonite preventing the business from flexing its muscle. When investigations, litigation or...more

Information Security and Privacy Group News: Cybersecurity Conference Essential Take-Aways Government, Industry and Legal...

Representatives of Connecticut businesses and corporations, educational institutions, and state and local government attended Murtha Cullina’s March 2016 Cybersecurity Conference at the Quinnipiac University School of Law....more

Missing laptop returned after Premier Healthcare reports data breach of 205,748 patients

Premier Healthcare, a multi-specialty group located in Bloomington, Illinois, announced in early March that an unencrypted laptop has been missing from its billing department since early January and started notifying affected...more

FDIC Publishes Special Edition of Quarterly Consumer News: A Bank Customer’s Guide to Cybersecurity

On March 8, the FDIC published a special edition of its Quarterly Consumer News entitled, “A Bank Customer’s Guide to Cybersecurity.” The guide provides consumers with, among other things, (i) safety tips for online banking;...more

Protect Your Employees’ Personal Information or You’re Putting Your Business at Risk

For the past few years, data breaches have made news headlines and raised awareness for data privacy and cybersecurity. Some of the most well publicized data breach stories have been the breaches of Sony, Target, Home Depot,...more

CFPB Announces First Ever Data Security Enforcement Action

On March 2, 2016, the Consumer Financial Protection Bureau (CFPB) announced its first data security related enforcement action against online payment systems company Dwolla, Inc. ...more

Privacy & Cybersecurity Update - January 2016

In this edition of our Privacy & Cybersecurity Update, we discuss, among other matters, the status of the EU/U.S. Safe Harbor negotiations, as well as changes to privacy laws in Delaware and California that regulate online...more

Cybersecurity and Data Privacy: Belated Holiday Gift - The IRS Doubles Down on Tax Free Identity Protection Services (1/16)

Following several high-profile breaches of business and government databases affecting the personal information of millions of Americans (including the IRS’s "Get Transcript" app) many businesses, governmental agencies and...more

Rise in Cyberattacks on Professional Services Firms

Wilson Elser’s Cyber Incident Response Team has seen an alarming uptick in cyber-criminal activity targeted at professional services firms, particularly accounting firms. As described in more detail below, the criminal...more

SEC’s 2016 Examination Priorities Include Continuing Focus on Cybersecurity Controls

The Securities and Exchange Commission last week issued a press release outlining the agency’s 2016 Examination Priorities that included cybersecurity. The release states: "To help fulfill the SEC’s mission of...more

Perspective: What Will Be the Defining Cybersecurity Issues In 2016?

As data breaches and their related obligations and liability risks continue to pile up with every passing year, we asked attorneys writing on JD Supra to answer the question: What will be among the defining issues for...more

Lessons Learned from LabMD's Successful Challenge to the FTC's Cyber Authority and Wyndham's Monumental Settlement with the FTC

On the shifting sands of cyber security regulation, it is important to understand the outcome of two recent enforcement cases brought by the Federal Trade Commission (FTC) – one against clinical lab services company LabMD,...more

Protect Your Wine Business Against Data Security Breaches and Other Cyber Risks

When asked who should buy cyber insurance, one expert responded, “more companies than realize it.” The truth is, almost every company in the country collects its customers’ or its employees’ Personally Identifiable...more

Government Forces Awaken: The Rise of Cyber Regulators in 2016

As the sun sets on 2015, but before it rises again in the New Year, we predict that, in the realm of cyber and data security, 2016 will become known as the “Rise of the Regulators.” Regulators across numerous industries and...more

350 Results
|
View per page
Page: of 14
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×